Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nginx 1 Web Server Implementation Cookbook
Nginx 1 Web Server Implementation Cookbook

Nginx is an open source high-performance web server, which has gained quite some popularity recently. Due to its modular architecture and small footprint, it has been the default choice for a lot of smaller Web 2.0 companies to be used as a load-balancing proxy server. It supports most of the existing backend web protocols such as FCGI,...

Microsoft SharePoint 2010 Administration: Real World Skills for MCITP Certification and Beyond (Exam 70-668)
Microsoft SharePoint 2010 Administration: Real World Skills for MCITP Certification and Beyond (Exam 70-668)

SharePoint 2010 is a complex product, and a diverse skill set is required to administer it. You have to be part database administrator (DBA), part web developer, part network administrator, and part server administrator to fully wrap your mind around this product. This book was written to help you do just that.

...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Fundamentals of ActionScript 3.0: Develop and Design
Fundamentals of ActionScript 3.0: Develop and Design

Welcome to ActionScript. Over the next several chapters, you’ll be introduced to one of the most versatile programming languages to create web applications for the browser, desktop applications, and mobile apps for multiple platforms. For years the Flash Platform has provided people with the most powerful set of...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Contributions in Analytic and Algebraic Number Theory: Festschrift for S. J. Patterson
Contributions in Analytic and Algebraic Number Theory: Festschrift for S. J. Patterson

The text that comprises this volume is a collection of surveys and original works from experts in the fields of algebraic number theory, analytic number theory, harmonic analysis, and hyperbolic geometry. A portion of the collected contributions have been developed from lectures given at the "International Conference on the Occasion of...

Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)

Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness.  This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

ASP.NET jQuery Cookbook
ASP.NET jQuery Cookbook

The jQuery library has become increasingly popular with web application developers because of its simplicity and ease of use. The library is supported by an active community of developers and has grown significantly over the years after its inception in 2006 by John Resig. Using this library eases complicated tasks and adds to the interactive...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)

Many years ago, when I had to learn C overnight to make a living as a programmer (this was before C++), I would have given half my salary to find a mentor, a person would say, “Here are the potholes in the road...errors that you are sure to make in learning C. And here’s how to steer around them.” Instead, I had to...

unlimited object storage image
Result Page: Previous 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy